STE WILLIAMS

If there were almost a million computer misuse crimes last year, Action Fraud is only passing 2% of cases to cops

Action Fraud (AF) is referring fewer computer misuse cases to police investigators despite official statistics showing nearly a million offences were reported last year.

In the 12 months to June this year, the Crime Survey for England and Wales (CSEW) reckoned that the number of computer misuse crimes had fallen – but also revealed that much-derided police initiative Action Fraud was passing fewer crimes, proportionately, to police for proper criminal investigation.

AF acts as a central reporting point for online crimes and is outsourced to a call centre company. Only a small proportion of reports made to AF are ever looked at by real police workers, as various recent investigations have found.

The Office of National Statistics (ONS) said in a statement explaining the crime figures that “variations existed within the subcategories of ‘computer viruses’ and ‘unauthorised access to personal information (including hacking)'”.

Comparing figures from July 2017 to June 2018, and for July 2018 to June this year, “computer misuse” crimes fell by 13 per cent from 1.1m to 977,000 and “computer virus” crimes by 27 per cent from 607,000 to 442,000. The survey asked around 30,000 adults each year for their experiences of being crime victims.

Reported data breaches increased a touch by 4 per cent from 514,000 to 535,000.

The CSEW has been criticised in the past for only counting crimes reported to police; crimes not reported for reasons such as “I don’t think police would do anything about this” are not included in the survey’s results.

Buried in among the usual government disclaimers with the ONS’s crime survey bulletin, however, was an assertion by the CSEW that it “is able to capture some of these unreported offences”, citing “the large difference in volume of computer misuse offences between the two sources – 977,000 offences estimated by the CSEW compared with 20,329 offences referred to the [National Fraud Intelligence Bureau] by Action Fraud.”

Mike Fenton, CEO at pen-testing biz Redscan, opined that these ONS figures were wrong and compared them to recent news stories from elsewhere.

“The fact that the statistics include just 20,000 offences reported against businesses to the National Fraud Intelligence Bureau by Action Fraud shows that the data is deeply flawed,” he said, adding: “Until the reporting of computer misuse crime improves, data like this should be taken with a large pinch of salt. The fight against cyber threats is a key issue that businesses need to prioritise and misleading headlines don’t do anyone any favours.”

Action Fraud has been asked to comment.

Earlier this year The Register did some number-crunching of its own to show that there is a 16 per cent chance of being jailed if you’re found guilty of a crime under the Computer Misuse Act 1990. In July a handful of British infosec firms wrote to the prime minister asking for reforms to the CMA which would encourage more active infosec research. ®

Sponsored:
Beyond the Data Frontier

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/21/action_fraud_computer_misuse_crimes_decrease/

Malware hides as iOS jailbreak, Sucuri is insecuri, and China is about to get even worse

Roundup Here’s your Register security roundup to kick off your week.

Malware hides as iOS jailbreak tool

The team over at Cisco Talos has spotted a clever bit of trickery being used by an iOS click fraud operation. Researchers say a piece of malware called “Checkrain” has been making the rounds spoofing a popular iOS jailbreaking tool called “checkra1n”.

“The site even claims to be working with popular jailbreaking researchers such as “CoolStar” and Google Project Zero’s Ian Beer,” Talos explains.

“The page attempts to look legitimate, prompting users to seemingly download an application to jailbreak their phone. However, there is no application, this is an attempt to install malicious profile onto the end-user device.”

Fortunately, the operation doesn’t do anything too destructive. The profile will pretend to perform the jailbreak, then run the phone through a number of affiliate links before finally installing a game. The attacker, meanwhile, would get an affiliate fee for the clickthroughs and game installs.

WordPress publishes security update

CMS app WordPress has posted its 5.2.4 update with a number of security fixes.

There’s nothing too worrisome in the patch, mostly cross-side scripting and information disclosure flaws, but it is always worth updating your software.

Sucuri hit by DDoS flood

Web security provider Sucuri says earlier this week it had the tables turned when someone pointed a DDoS cannon at the company’s own threat protection service. The result was a prolonged outage and subsequent slowdown.

Sucuri said that in addition to flooding its services with traffic, the attackers managed to take down a pair of failsafes that should have protected the network from being knocked offline.

“We experienced a large DDoS that saturated parts of our network, and a series of unforeseen circumstances throughout the chain contributed to the total impact (both in number of customers affected and global performance),” the post explains.

The security provider is declining to provide too many details, and it says the attack is still going on.

New Chinese program expands surveillance

If you thought internet surveillance in China was extensive before, it’s about to get even worse. China Law Blog reports that a new program will aim to collect and analyze all raw data in the country, dramatically expanding what is collected and sifted through.

US attacked Iran, says new report

Reuters says that in the midst of last year’s Saudi oil field attacks, the US launched a cyber attack against Iran that apparently was aimed at taking down communications equipment.

Warning issued over VPN apps

An alert has been posted over yet another crop of bugs that can make VPN stand for “very public network”.

These 10 vulnerabilities cropped up in Pulse VPN. A successful exploit could allow the attacker to spy on some or all of the traffic on the targeted VPN.

Pulse has posted an update, but these fixes will need to be implemented by the providers themselves, so there’s not much customers can do.

ICE using stingrays

A report from Univision has found that ICE agents in New York are now using stingray gear to track the movements of people who are suspected of immigration offenses. This isn’t anything new for law enforcement agencies, but might be a first for ICE, the much-maligned customs enforcement agency.

Linux Wi-Fi flaw found

Word has surfaced of a potential remote code execution flaw in Linux that would let attackers target Wi-Fi hardware. There are no working PoCs as of yet, but users and admins should make sure to get updates for their devices as soon as a fix is developed and released.

Sponsored:
How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/21/security_roundup_181019/

Deus ex hackina: It took just 10 minutes to find data-divulging demons corrupting Pope’s Click to Pray eRosary app

Exclusive The technology behind the Catholic Church’s latest innovation, an electronic rosary, is so insecure, it can be trivially hacked to siphon off worshipers’ personal information.

The eRosary, which went on sale this week at just $109 (£85) a pop, consists of ten metallic beads, and a metal cross that’s Bluetooth enabled, has wireless charging, and is motion sensitive.

When the wearer makes the sign of the cross with the rosary, the accompanying Click to Pray app on their paired phone or tablet activates: this software suggests which rosary movements to make, and which prayers to mumble. It can also be configured to remind believers that it’s time for a chat with God.

However, infosec bods at UK-based Fidus Information Security quickly uncovered flaws in the backend systems used by the Click to Pray app, which is available for iOS and Android. The security vulnerabilities are more embarrassing than life-threatening.

‘Bodged’

“One of our researchers decided to check out the code, and in just 10 minutes found some glaring issues,” Andrew Mabbitt, founder of Fidus, told The Register on Friday. “It looks like someone’s taken a fitness band app and bodged it together with existing code that leaves any user account hackable.”

The Fidus egghead who found the flaw, Chris, explained there were two key issues. Firstly, when you install the Click to Pray app, you’re asked to create an online account. This profile is protected by a four-digit PIN. Yes, just four digits to log into your profile from the Click to Pray app. This is trivial to brute-force because you are given unlimited retries, and there is no mechanism to slow the process.

Secondly, the application talks to its backend systems via API calls: sendPIN and resetPIN. Due to a vulnerability in the code, it was possible to send over a user’s email address via this API and retrieve the corresponding account PIN in a readable format. That meant if someone submitted a stranger’s email address, they could gain access to the corresponding Click to Pray profile, if one existed.

Fidus revealed more information here, on its website, on Friday.

pope

Boss of venerable sect with millions of devoted followers meets boss of venerable sect with… yeah, you get the idea

READ MORE

The Register set up a dummy account on the app, using the name Satan, and, sure enough, it was hijacked within minutes by the Fidus team. While accounts do not store anything too sensitive, such as financial information, they do contain personally identifying data – such as folks’ names and physical descriptions. In countries like China, where Catholics aren’t too popular, this sort of data could be damaging if exposed.

Father Frederic Fornos, the International Director Pope’s Worldwide Prayer Network, told The Register that as soon as he was alerted to the security weaknesses by Fidus on Thursday, he put Vatican coders on the job to fix it, and pledged to, miracles upon miracles, have the holes patched over within 24 hours.

And according to Fidus, the developers have already shored up the software, kind of. “They have fixed the [API] issue, but in a really convoluted way,” Mabbitt told us.

“Now when the API call is made, you can’t extract the four-digit PIN [from the data sent back]. But there is still no protection against brute forcing the PIN, so that’s definitely still an option.”

A Vatican spokesperson told The Register the API shortcomings were also spotted by a security researcher going by the pseudonym Elliot Alderson, who, like Fidus, privately reported the bugs but also sent the Vatican code to fix the issue. You can read Alderson’s full report here [PDF].

The eRosary has only just been announced, so just a few thousand people are using the thing, judging from the Android store stats. Until the app is completely fixed, those who feel the need for electronic prayer monitoring should hold off and stick to the more traditional ways of practicing their faith. ®

Sponsored:
Technical Overview: Exasol Peek Under the Hood

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/10/18/vatican_erosary_insecure/

In A Crowded Endpoint Security Market, Consolidation Is Underway

Experts examine the drivers pushing today’s endpoint security market to consolidate as its many players compete to meet organizations’ changing demands and transition to the cloud.

The overcrowded endpoint security market is rife with activity as its many players compete to meet new enterprise demands and large companies buy small ones in hopes of staying afloat.

Gartner listed 20 companies in its “2019 Magic Quadrant for Endpoint Protection Products,” says Peter Firstbrook, research vice president with the company and one of the report’s authors, but he could have easily invited another 10. “There’s far too many,” he points out. “This market is overdue for consolidation.”

What made it so crowded? There are two types of companies in the endpoint security market, which, in general, provides centrally managed technology to lock down the endpoint. The traditional giants, including McAfee, Symantec, and Kaspersky, were early players in the market and historically provided antivirus tools and firewalls to defend machines against cyberattacks.

“Then someone would come up with a new way to attack endpoints, and someone else would come up with a way to block those attacks,” says John Pescatore, SANS’ director of emerging security trends, of how the market evolved – until a new wave of companies introduced the idea that protection is never perfect. Businesses must be able to detect and respond to threats.

The shift to endpoint detection and response (EDR), and the consequent proliferation of endpoint-focused companies, began when ransomware started to become a major enterprise problem, Firstbrook explains. Incumbent providers were complacent in their roles and “caught flat-footed” when ransomware hit. It wasn’t necessarily the vendor’s fault, he adds, noting that customers didn’t always upgrade their systems as needed. Still, the problem demanded a change in how organizations approached security and kept their security software up-to-date. 

“Ransomware was a big wake-up call, costing serious amounts of money, and companies were going out of business,” Firstbrook says. Incoming EDR companies, including CrowdStrike, Carbon Black, SentinelOne, and Endgame, took an approach to security the older players hadn’t, with behavioral-based detection instead of seeking indicators of compromise. It’s much more efficient to watch for strange behavior than to watch for every version of malicious software.

“It’s really hard for [attackers] to completely rearchitect a program,” Firstbrook says. “Behavioral-based detection forces them to rewrite it. EDR and behavioral detection are becoming primary components of endpoint detection solutions.” EDR companies brought several new advantages — for example, the ability to run on top of more traditional platforms.

These startups, with their new behavioral-based approach and “assumed breach” mindset, generated venture capital money, Firstbrook explains, and the market grew. Both old and new endpoint security businesses have their strengths. Now, there are simply too many of them.

Redefining the Endpoint
One of the biggest trends in today’s endpoint security market is product management, and much of the decision-making for security products is moving to the cloud. Traditional endpoint companies sold on-premises systems to communicate with a central cloud server that provides IOC data. That made it tough to keep users updated; however, moving management servers to the cloud eliminates this requirement and gives users the most current protection.

Cloud and virtualization are changing the definition of the endpoint and companies’ approach to securing it, SANS’ Pescatore explains. As the attack surface grows to include firmware and supply chain attacks, organizations are investing more in cloud-native products to protect themselves.

The promise of a cloud-based platform is as threats change, companies can detect and react to changes without having to install any new management software. They don’t have to maintain the management server, it’s easy to get up and running, and it’s easy to pull data from clients outside the network. While “cloud native” is hard to define, Firstbrook points to CrowdStrike as the best example, citing its lightweight architecture and role as a rules enforcement engine and data collection engine. If a company has an idea for how to create a rule, it can do it.

Amid such a disruptive period, it can be difficult for bigger firms to keep up. Firstbrook points to Symantec: It offers a cloud-based management console, but there is not a lot of integration between protective technology and EDR technology. He says it may be a little more clunky, and a little less efficient, until the company converges to fully cloud-native architecture.

“They see the changes, and they’re addressing them, but I think at this point it’s such a big change they may not make the changes in time to really capture it,” Firstbrook adds.

On top of the move to cloud, there is a greater demand for simplicity, says Hank Thomas, partner at Strategic Cyber Ventures. Security buyers in the enterprise are tired of dealing with complex systems and multiple point products for narrowly focused needs. “They want to focus on security tools that they can remotely maintain and are consolidated in one place,” he said.

Endpoint security products are becoming harder to use, Firstbrook points out. People want them to be more sensitive, but they’re not always qualified to review the data and say whether it’s a false positive or actual threat. As a result, vendors are starting to provide more operational services, from installation, to configuration, to light management, to full management. IT teams don’t have time to swap out their vendors, learn a new tool, and continuously monitor it.

“Endpoint is something everyone has to do, but not every company has to be an expert in,” he adds. Going forward, it will be important for endpoint security tools to adopt to different detection technologies or new machine learning techniques without the client needing to act.

Too Many Cooks in the Kitchen?
The endpoint security market has grown packed with companies old and young attempting to meet these new enterprise demands. Several recent acquisitions underscore the growing importance of new technologies among older companies struggling to innovate, experts say.

{Continued on next page} 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full BioPreviousNext

Article source: https://www.darkreading.com/endpoint/in-a-crowded-endpoint-security-market-consolidation-is-underway/d/d-id/1336125?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Tor Weaponized to Steal Bitcoin

A years-long campaign targets users of Russian darknet markets with a modified install of a privacy-oriented browser.

Criminals are using the Tor browser — long a favorite of privacy-conscious users — to steal Bitcoin from their victims, researchers at ESET have discovered. The campaign, aimed at a Russian-speaking audience, uses a number of steps to convince users to install a weaponized version of Tor masquerading as the official Russian-language version of the browser. From there, settings and extensions loaded with the malicious browser allow the criminals to manipulate the pages displayed to users, leading them to sites that take Bitcoin from wallets without the owners’ permission.

According to the researchers, the bitcoin-stealing campaign has been active and unnoticed for years. Anton Cherepanov, ESET senior malware researcher, notes that the Bitcoin wallets into which stolen Bitcoins are deposited have been active since 2017.

Cerepanov says the JavaScript payload ESET researchers have seen delivered by the malicious websites targets three of the largest Russian-speaking darknet markets. This payload attempts to alter QIWI (a popular Russian money transfer service) or Bitcoin wallets located on pages from these markets.

The campaign is ongoing.

Read more here.

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/tor-weaponized-to-steal-bitcoin/d/d-id/1336127?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Phishy text message tries to steal your cellphone account

Lots of people still think of phishing as a type of scam that arrives by email.

That’s because most phishing attacks do, indeed, arrive in your inbox – sadly, spamming out emails is cheap and easy for crooks, and it delivers results simply because of the volume they can achieve.

But phishing isn’t only about email – it’s a scamming technique that applies to every form of electronic messaging, including social media, instant messaging…

…and even, or perhaps especially, good old SMS texts.

One of the delightful simplicities of SMS is that it was designed back when mobile phones first came out, and thus when network bandwidth was limited.

So SMSes are short, simple, and text-only, and this stripped-down nature actually makes them ideal for crooks.

Messages sent via SMS unexceptionably use a brief and direct style that makes it much easier to get the spelling and grammar right.

The brevity of SMSes also means that shortened or unusual-looking URLs are commonplace, so we’re more inclined to accept them than we would be if they showed up in an email.

Even though services such as Skype, WhatsApp, Instagram and Snapchat have become the first-choice messaging apps of today’s youngsters, SMS has never gone away, because every phone, on every network, in every country, still supports it.

In the UK, for example, most pay-as-you-go mobile plans throw in ‘unlimited SMSes’ as an incentive to attract users to their plans – you might not need SMS any more, but it’s certainly handy to have an all-you-can-eat SMS buffet thrown in with every basic deal.

And which sort of company is most likely to contact you via SMS?

Why, your mobile phone provider, of course!

They know the message will get through, because they manage your account, and they know your phone handset will definitely be able to display it.

Like this:

OK, so you ought to spot this as a scam, because the crooks have messed up the English slightly (we’re not going to give them a free grammar lesson here, but a few tweaks would improve the looks greatly), and because they have, of necessity, created a bogus domain that’s visibly different from the genuine one.

The crooks can’t use the domain name ee DOT co DOT uk, of course, because that’s the real deal and would take you to mobile provider EE’s genuine website.

But the crooks can put ee DOT co DOT uk at the left-hand end of an innocent-looking domain name of their own for a touch of realism.

And in this case, they’ve registered the name uk-ref[redacted] DOT com, which doesn’t look entirely out of place, given that EE is a UK company, and this scam is aimed at users in the UK.

For a German provider, the crooks could just put de- at the start of their domain name, or use ca- for Canada, and so on.

In this case, the crooks haven’t done any targeting of their attack – the member of our team who received this phish wasn’t actually on EE’s network, so they were in no doubt that it was fraudulent.

But EE is one of the UK’s biggest mobile providers, so a significant minority of recipients will see a message that does match their network.

In theory, the first few digits of each number would have given the crooks a good guess at each network provider, so targeting this SMS scam to each recipient’s home network would have been fairly easy. That would have avoided ‘false positives’ where the recipients realised at once that they were being scammed. On the other hand, number-to-network directories aren’t always 100% correct, and some users have multiple SIMs, so the crooks may have decided instead to avoid ‘false negatives’, where they might miss out on potential victims by needlessly leaving them off the list. When the cost of sending 100,000 messages is not significantly higher than sending 10,000 or even 1000, there is little reason for the crooks to hold back.

As you can see, the crooks seem to be paying heed to the old adage that you catch more flies with honey than with vinegar.

Although this scam is trying to trick you into logging on in order to avoid something bad, the crooks aren’t squeezing you too hard.

The crooks are fraudlently claiming that they’re trying to bill you, which is something that you expect to happen every month if you’re on a contract, but they’re not threatening to cut you off if you DON’T PAY RIGHT NOW, and they haven’t littered their message with SPELING MISTEAKS, outrageous DEMANDS and too many EXCLAMATION POINTS!!!

The crooks even said “please”, and are offering you a reasonable-sounding chance to correct the mistake before you rack up late payment fees.

Of course, if you click through you will need to log on, as you might expect if you want to check your user profile and your billing data, and the crooks present an almost-perfect ripoff of the real thing:

For reference, EE’s real login page looks like this [2019-10-16T10:00Z]:

The site shown above was hosted via a cloud-based web service that handily provides its customers with a basic web server that’s already configured with an HTTPS certificate, so your browser shows you a padlock, thus avoiding an alert of an unencrypted site.

Happily, this password-stealing site was quickly and widely blocked by cybersecurity companies and browsers, and has now been taken down, but anyone who inadvertently put in their password would immediately have passed it to the crooks.

What to do?

  • Change your password as soon as you can. If you think you just gave away your password by mistake, go and change it on the real site right away. Don’t wait to see what happens – get there before the crooks do. Don’t risk getting locked out of your own account, trying to convince your service provider that you aren’t the crook!
  • Look for obvious mistakes in messages. The crooks have upped their game and make fewer mistakes than they used to, but they still need to use bogus domain names, and they often make some mistakes. If any evidence of phishiness is there, make sure you act on it.
  • Don’t login via links sent from outside. Bookmark each provider’s logon page for yourself, or use a password manager that ties passwords to specific URLs. That way you won’t get suckered into visiting a fake login page that a crook pre-selected for you.
  • Report phishing scams – please do your bit to help everyone else. You can report potential cyberthreats – files, emails and URLs – to Sophos via our Submit a Sample page. In the UK, report phishes to law enforcement via Action Fraud. In the USA, use the FBI’s Internet Crime Complaint Center.

By the way, given that it’s Cybersecurity Awareness month, we’ve been publishing a light-hearted poem each day on @NakedSecurity – and below you’ll find some gentle advice about not letting your guard down when the crooks are out to get you.

Whatever you do, don’t be this guy…

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/i_zR2R90vUk/

Learn About the Underground World of Anti-Cheats at Black Hat Europe

Applied Security Briefing lineup for this December event also includes expert looks at Google’s ClusterFuzz and the art of breaking PDF encryption.

The organizers of Black Hat Europe have already announced some cutting-edge cybersecurity Briefings for the upcoming December event, including intriguing Applied Security Briefings on everything from cracking PDF encryption to the underground world of anti-cheat software.

Unveiling the Underground World of Anti-Cheats is a 50-minute Briefing about how a security researcher analyzed, tested and discovered multiple bypassing techniques against contemporary anti-cheat technologies. You’ll learn about a combination of static and dynamic investigation techniques including XignCode3, EasyAntiCheat and BattleEye and discover the virtues and weaknesses of each, along with a new tool for testing anti-cheat technology.

ClusterFuzz: Fuzzing at Google Scale offers you an inside look at how a Google team overcame the challenges of scaling to build and operate the largest publicly known fuzzing infrastructure, running over 25,000 cores and 2,500 targets. You’ll see how ClusterFuzz helped find 8,000 security vulnerabilities in several Google products, learn how it completely automates the entire fuzzing lifecycle, and hear how the process of writing fuzz targets into developer workflows was made to work at scale.

How to Break PDF Encryption promises to give attendees detailed insights and results from the analysis of PDF encryption tests on 27 of the most popular PDF viewers on the market. Researchers will demonstrate two novel techniques for breaking the confidentiality of encrypted documents, and walk you through responsible identification and disclosure processes.

Get more information on these and other practical presentations in the Briefings schedule for Black Hat Europe, which returns to The Excel in London December 2-5, 2019! For more information on what’s happening at the event and how to register, check out the Black Hat website.

Article source: https://www.darkreading.com/black-hat/learn-about-the-underground-world-of-anti-cheats-at-black-hat-europe/d/d-id/1336115?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

SOC Puppet: Dark Reading Caption Contest Winners

Social engineering, SOC analysts, and Sock puns. And the winners are:

First Prize ( $25 Amazon gift card) goes to Deadsnott, aka John-Paul Power, whose day job is information developer at Symantec. The winning caption:

Second prize ($10 Amazon gift card) awarded to havancourt, with the punny “The auditors are performing a SOX review.”

Finally, many thanks to everyone who entered the contest and to our loyal readers who cheered the contestants on. Also, a shout out to our judges, John Klossner and the Dark Reading editorial team: Tim Wilson, Kelly Jackson Higgins, Sara Peters, Kelly Sheridan, Curtis Franklin, Jim Donahue, Gayle Kesten, and yours truly.

If you haven’t had a chance to read all the entries, be sure to check them out today.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “How to Build a Rock-Solid Cybersecurity Culture.

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting … View Full Bio

Article source: https://www.darkreading.com/operations/soc-puppet-dark-reading-caption-contest-winners/a/d-id/1336118?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Glitching: The Hardware Attack that can Disrupt Secure Software

Glitching (or fault-injection) attacks aren’t easy (yet). But get ready, because as the IoT grows, these attacks will be a big reason that hardware security should be part of your cybersecurity planning.

Modern computers expect a certain consistency in their operating environments. A nice, steady ticking of the electronic clock; smooth, consistent voltage to make everything run; and internal system temperatures that fall within a certain specified range. When their expectations aren’t met, weird things can happen.

If those “weird things” happen because of unanticipated power fluctuations, it can be annoying. If they happen because a malicious actor intentionally manipulated power or other environmental elements, they can be the beginning of a devastating attack.

Enter glitching.

(Image: Saktanong, via Adobe Stock)

Glitching attacks are defined as attacks that involve causing a hardware fault through manipulating the environmental variables in a system. When power, high-temperature sensors, or clock signals are interrupted, the CPU and other processing components can skip instructions, temporarily stop executing programs, or behave in other ways that can allow attackers to slip malicious instructions into the processing gaps.

Glitching is most useful for systems that serve special purposes (like encryption), or those that are “headless” — IoT computers that don’t have a standard user interface that can be manipulated by normal malware or social engineering techniques.

It’s an outlier technique in the threat actor’s toolkit, though. Glitching generally requires intimate knowledge of the hardware and software of the specific system under attack and it requires physical access to that system. It is, though, something that security professionals should know about, especially if they have IoT systems under their care.

It should be noted that glitching attacks are neither easy nor simple to pull off (although researchers recently made it easier by releasing chip.fail, a toolkit to bring glitching “to the masses”). The goal in glitching isn’t simply to stop a system from running — that could be done by simply cutting power in most cases — but to gain access to the system’s resources or damage its ability to effectively complete its given task, when a purely software approach isn’t effective.

Timing’s Leading Edge
Many glitch attacks are based on the shape of a signal. The electrical signals that move through a computer system tend to have sharp rises and drops. On an oscilloscope, the image is a series of square waves. The processor knows to start a new instruction when it detects a sharp rise in voltage — the “leading edge” of the wave. In a presentation given at Black Hat 2015, Bret Giller, a computer security consultant at NCC Group, provided steps for implementing an electrical glitching attack

In his presentation, Giller points out that each instruction takes a certain amount of time to execute; the execution time and the timing of those leading edges are in sync. If an attacker can inject a leading edge into the circuit so that it arrives too soon, then the processor can be tricked into executing a new instruction before the previous instruction has finished, or into skipping instructions altogether.

This kind of glitching can involve a power spike or manipulating the system’s clock by speeding it up (overclocking). Ricardo Gomez da Silva, a faculty member at Technische Universität Berlin Institut für Softwaretechnik und Theoretische Informatik, described these clock-glitching attacks and discussed how to protect against them in a paper published in 2014.

An attacker could gain access to the hardware and just inject stray signals to see what happens, but that’s unlikely to be productive. Instead, as Ziyad Alsheri pointed out in a presentation given at Northeastern University in the fall of 2017, the attacker needs to have intimate knowledge of the processor, the overall system, and the software in order to know precisely when to inject the spurious signal and what to do with the brief burst of resulting chaos.

Glitching the Fall
While instruction execution is triggered by the leading edge of a signal, there are some operations, such as writing data to a memory location, that can be triggered by the sharp voltage fall on the trailing edge of a wave.

A drop in the voltage supplied to the system can eliminate the sharp drop that triggers operations. In his Black Hat presentation, Giller said these “brown out” glitches can be responsible for data corruption and lost information, among other consequences. This sort of data corruption attack can be valuable when the system under attack is responsible for encryption or authentication. Disrupting the data in one part of the process can weaken the entire process to the point that the protection is ineffective.

Outliers
By now, it should be obvious that there are easier ways to hack most systems. The descriptions given in academic papers and research notes show a process that involves a great deal of research and physical access in order to compromise a single system.

However, researchers Thomas Roth and Josh Datko made it simpler and less expensive at Black Hat 2019, when they presented “Chip.Fail,” research conducted with their partner Dmitry Nedospasov. Not only did they demonstrate their glitching (fault-injection) attacks on IoT processors, they did so using less than $100 of equipment. They released this toolkit and framework at the conference, so researchers can test chips’ vulnerability to these types of attacks.  

Nevertheless, glitching may never replace social engineering as a way into office productivity computers. So far, it is not even a huge factor in compromising embedded control systems in the real world.

Yet cybersecurity professionals should remain aware of its possibilities because academic research can become a real-world attack with the breakthrough of a single dedicated security research team.

Related Content:

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/edge/theedge/glitching-the-hardware-attack-that-can-disrupt-secure-software-/b/d-id/1336119?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

CenturyLink Customer Data Exposed

Customer names, addresses, email addresses, and phone numbers were left open on a MongoDB server for 10 months, researchers report.

A CenturyLink customer information database with some 2.8 milliion records was found exposed on the public Internet, exposing personal details of hundreds of thousands of its customers.

Researchers from Comparitech and security researcher Bob Diacehnko found the misconfigured MongoDB database on Sept. 15. According to the researchers, the database – which was affiliated with a third-party notification platform used by CenturyLink – had been exposed for 10 months. It was locked down on Sept. 17, two days after the researchers alerted CenturyLink.

Customer names, addresses, email addresses, and phone numbers were exposed. 

“The data involved appears to be primarily contact information and we do not have reason to believe that any financial or other sensitive information was compromised,” CenturyLink said in a statement to Comparitech. “CenturyLink is in the process of communicating with the affected customers. We will continue to work with our vendors to protect customer information.”

Read more here

This free, all-day online conference offers a look at the latest tools, strategies, and best practices for protecting your organization’s most sensitive data. Click for more information and, to register, here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/centurylink-customer-data-exposed-/d/d-id/1336123?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple